E-Book, Englisch, Band 10, 846 Seiten
Bertino / Joshi Collaborative Computing: Networking, Applications and Worksharing
1. Auflage 2009
ISBN: 978-3-642-03354-4
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
4th International Conference, CollaborateCom 2008, Orlando, FL, USA, November 13-16, 2008, Revised Selected Papers
E-Book, Englisch, Band 10, 846 Seiten
ISBN: 978-3-642-03354-4
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
This book constitutes the proceedings of the 4th conference CollaborateCom 2008 in Orlando, Florida and reflects the research results in collaborative computing networks, systems, and applications. The 18 invited papers and 41 full papers demonstate recent advances in many computing fields, including multi-core architectures, 3G/4G wireless networks, web 2.0 technologies, computing clouds, and software as a service. This volume is aimed at researchers interested in networking, systems, and collaborative learning and educations alike.
Autoren/Hrsg.
Weitere Infos & Material
1;Title Page;2
2;Preface;5
3;Table of Contents;9
4;Invited Short Papers;14
4.1;A Distributed Collaborative Filtering Recommendation Model for P2P Networks;14
4.1.1;Introduction;14
4.1.2;A Distributed Collaborative Filtering Recommendation Architecture;15
4.1.2.1;CF Module;17
4.1.2.2;Routing Module;18
4.1.2.3;Messaging Module;20
4.1.3;Experiment;21
4.1.4;Conclusion;22
4.1.5;References;22
4.2;Access Control for Cooperation Systems Based on Group Situation;24
4.2.1;Introduction;24
4.2.2;A Motivating Example – $Preparing Presentation$;26
4.2.3;Context, Situation, and Group Situation;27
4.2.3.1;Context and Situation;27
4.2.3.2;Group Situation Based Cooperation;28
4.2.4;Group Situation Based Access Control;28
4.2.4.1;User-Role Mapping;29
4.2.4.2;Role-Permission Assignment;30
4.2.5;Illustrative Examples;32
4.2.6;Conclusions and Future Works;34
4.2.7;References;35
4.3;Web Canary: A Virtualized Web Browser to Support Large-Scale Silent Collaboration in Detecting Malicious Web Sites;37
4.3.1;Introduction;37
4.3.2;Related Work;39
4.3.3;Design;40
4.3.3.1;System Monitoring and Filtering Module;40
4.3.3.2;URL Collecting Module;40
4.3.3.3;Auto-Reversion;41
4.3.3.4;Persistent Storage;41
4.3.3.5;Attacks That Web Canaries Cannot Detect;41
4.3.4;Implementation;41
4.3.5;Evaluation;42
4.3.5.1;Testbed;43
4.3.5.2;Effectiveness to Detect Malicious Web Pages;43
4.3.5.3;Performance Evaluation;44
4.3.6;Conclusion;45
4.3.7;References;45
4.4;CalSWIM: A Wiki–Based Data Sharing Platform;47
4.4.1;Introduction;47
4.4.2;Background and Related Work;48
4.4.3;CalSWIM Wiki;50
4.4.3.1;Content Creation;52
4.4.3.2;Version Control;53
4.4.3.3;Content Structure;53
4.4.3.4;Access Control;53
4.4.4;Evaluation;54
4.4.5;Conclusions and Future Work;55
4.4.6;References;55
4.5;Examining a Bayesian Approach to Personalizing Context Awareness in Ubiquitous Computing Environments;57
4.5.1;Introduction;57
4.5.2;Related Work;58
4.5.3;User-Centered Context Awareness;60
4.5.3.1;A Bayesian User Context Model;60
4.5.3.2;Building and Training the Model;61
4.5.4;Evaluation of Model Performance;63
4.5.5;Conclusion and Future Work;65
4.5.6;References;66
5;Invited Full Papers;69
5.1;Smart Homes for All: Collaborating Services in a for-All Architecture for Domotics;69
5.1.1;Introduction;69
5.1.2;Related Work;71
5.1.3;Architecture;72
5.1.3.1;Service Composition;75
5.1.3.2;Brain-Computer Interaction;76
5.1.4;Conclusions;80
5.1.5;References;80
5.2;Archer: A Community Distributed Computing Infrastructure for Computer Architecture Research and Education;83
5.2.1;Introduction;83
5.2.2;Background and Motivations;85
5.2.3;Archer Infrastructure;87
5.2.3.1;Overall Design Approach;87
5.2.3.2;Archer Core Middleware;88
5.2.3.3;Collaboration and Sharing;91
5.2.3.4;Deployment Modes;91
5.2.3.5;Security Considerations;92
5.2.3.6;Performance Considerations;92
5.2.4;Related Work;94
5.2.5;Conclusions and Future Work;95
5.2.6;References;96
5.3;Collaborative Search and User Privacy: How Can They Be Reconciled?;98
5.3.1;Introduction;98
5.3.2;Related Work;100
5.3.3;Study Design and Environment;101
5.3.3.1;Study Design Decisions;101
5.3.3.2;Study Environment and Methodology;101
5.3.3.3;Study Representativeness;103
5.3.4;Study Evaluation;104
5.3.4.1;Policy Structure;104
5.3.4.2;General Policies;104
5.3.4.3;Conditions;105
5.3.4.4;Groups;106
5.3.4.5;Link Policies;107
5.3.4.6;Discussion;108
5.3.5;Enforcing CSE Policies;108
5.3.5.1;Reciprocity;109
5.3.5.2;Anonymous Collaborative Search;109
5.3.6;Conclusions;110
5.3.7;References;111
5.4;Defending against Attribute-Correlation Attacks in Privacy-Aware Information Brokering;113
5.4.1;Introduction;113
5.4.2;Related Work;115
5.4.3;Information Brokering Overview;115
5.4.3.1;The Attribute-Correlation Attack;116
5.4.4;New Privacy-Preserving IBS Design;117
5.4.4.1;Broker Tree Construction;118
5.4.4.2;Query Segment Encryption;119
5.4.5;Analysis;122
5.4.5.1;Privacy Analysis;122
5.4.5.2;Performance Analysis;123
5.4.6;Conclusion;124
5.4.7;References;124
5.5;Incentive and Trust Issues in Assured Information Sharing;126
5.5.1;Introduction;126
5.5.2;Related Work;128
5.5.3;Our Model;128
5.5.3.1;Behaviors;131
5.5.4;Experimental Setup;132
5.5.5;Experimental Results;132
5.5.6;Conclusions;136
5.5.7;References;137
5.6;Combining Social Networks and Semantic Web Technologies for Personalizing Web Access;139
5.6.1;Introduction;139
5.6.2;Overview of the Proposed Approach;142
5.6.2.1;Overall Framework;142
5.6.2.2;System Architecture;143
5.6.3;Users’ Credentials and Relationships, Web Metadata and Ratings;144
5.6.3.1;Users’ Credentials and Relationships;144
5.6.3.2;Web Metadata;145
5.6.3.3;Ratings;147
5.6.4;Trust Policies;149
5.6.5;User Preferences;152
5.6.6;User Preference Enforcement;154
5.6.7;Conclusions and Future Work;156
5.6.8;References;157
5.7;Evaluating Security Policies in Pervasive Mobile Environments Using Context Information;158
5.7.1;Introduction;158
5.7.2;Modeling Context Variables;160
5.7.3;The Monte Carlo Method;164
5.7.4;The Monte Carlo Method for One Context Variable;164
5.7.5;The Monte Carlo Method for Multiple Context Dependent Variables;165
5.7.6;Risk;168
5.7.7;Security Policies;169
5.7.8;Related Work;171
5.7.9;Conclusions and Future Work;172
5.7.10;References;172
5.8;Towards Continuous Workflow Enactment Systems;175
5.8.1;Introduction;175
5.8.2;Existing Workflow Model;177
5.8.3;From the Existing to the Continuous Workflow Model;179
5.8.3.1;Communication Patterns;179
5.8.3.2;Ability of Existing Workflows to Support Push Input;179
5.8.4;Continuous Workflow Model;181
5.8.4.1;Windows;182
5.8.4.2;Workflow Patterns in Continuous Workflows;183
5.8.4.3;Applicability of Continuous Workflow Patterns;188
5.8.5;Conclusions and Future Work;189
5.8.6;References;190
5.9;The RiverFish Approach to Business Process Modeling: Linking Business Steps to Control-Flow Patterns;192
5.9.1;Introduction;192
5.9.2;Related Work;194
5.9.3;Foundation;195
5.9.3.1;Control-Flow Patterns;195
5.9.3.2;RiverFish Conceptual Schema;195
5.9.4;From Business Steps to Control-Flow Patterns;198
5.9.4.1;Declaring and Classifying Business Steps (Phase 1);199
5.9.4.2;Positioning Business Steps (Phase 2);200
5.9.4.3;Dependency among the Business Steps (Phase 3);201
5.9.4.4;Graphical Modeling of Business Process (Phase 4);201
5.9.4.5;Describing the Split and Merge Points (Phase 5);202
5.9.4.6;Identifying Control-Flow Patterns (Phase 6);202
5.9.4.7;Representing Process Modeling in BPM Tools (Phase 7);203
5.9.5;Conclusion;205
5.9.6;References;206
5.10;A Federated Digital Identity Management Approach for Business Processes;207
5.10.1;Introduction;207
5.10.2;Running Example;208
5.10.3;Identity Management for Business Processes;209
5.10.4;Preliminary Concepts;210
5.10.5;Interoperable Multi-factor Authentication;212
5.10.5.1;Identity Attribute Matching Protocol;212
5.10.5.2;Multi-factor Authentication;215
5.10.6;System Architecture and Implementation;216
5.10.7;Experimental Evaluation;218
5.10.8;Concluding Remarks;219
5.10.9;References;219
5.11;$SelectAudit$: A Secure and Efficient Audit Framework for Networked Virtual Environments;220
5.11.1;Introduction;220
5.11.2;An Example;222
5.11.3;Preliminaries;223
5.11.4;Our Approach;224
5.11.4.1;Overview;225
5.11.4.2;Our SelectAudit Protocol;226
5.11.5;Conclusions;228
5.11.6;References;229
5.12;Collaborative Attack vs. Collaborative Defense;230
5.12.1;Introduction;230
5.12.1.1;Our Contributions;231
5.12.1.2;Related Work;232
5.12.2;Collaborative Attack vs. Collaborative Defense: An High-Level Evaluation Framework;232
5.12.3;A Characterization of Collaborative Attack;235
5.12.4;A Characterization of Collaborative Defense;238
5.12.5;Summary and Future Work;240
5.12.6;References;241
5.13;Learning Models of the Negotiation Partner in Spatio-temporal Collaboration;242
5.13.1;Introduction;242
5.13.2;Justifying the CRF Problem;243
5.13.3;Bayesian Learning of Preferences;245
5.13.3.1;Bayesian Learning;245
5.13.3.2;Determining the Posterior Probabilities;246
5.13.4;Experimental Study;248
5.13.4.1;Strategies Used by the Opponent;248
5.13.4.2;Performance of Learning;249
5.13.4.3;Performance of Negotiation with or without Learning;253
5.13.5;Related Work;254
5.13.6;Conclusion;255
5.13.7;References;255
6;Full Papers;257
6.1;Protecting Sensitive Information in Directory Services Using Virtual Directories;257
6.1.1;Introduction;257
6.1.2;Background and Related Work;259
6.1.2.1;Directory Services;259
6.1.2.2;Protecting Information in Directory Services;259
6.1.2.3;Metadirectories and Virtual Directories;260
6.1.3;Our Approach;261
6.1.3.1;Data Encryption;261
6.1.3.2;System Architecture;262
6.1.3.3;Collaboration and Delegation;264
6.1.4;Implementation and Performance Testing;265
6.1.5;Discussion;267
6.1.5.1;Advantages of Using Virtual Directories;267
6.1.5.2;Advantages of Using Encryption;268
6.1.5.3;Vulnerabilities;268
6.1.5.4;Performance Analysis;268
6.1.6;Future Work and Conclusion;269
6.1.7;References;269
6.2;TeleEye: An Awareness Widget for Providing the Focus of Attention in Collaborative Editing Systems;271
6.2.1;Introduction;271
6.2.2;Awareness in CES;272
6.2.3;Eye Tracking Mechanisms;275
6.2.4;An Awareness Widget for Providing the Focus of Attention Using the User’s Point of Regard;277
6.2.5;Comparison of Awareness Widgets;280
6.2.6;Conclusions, Comments and Future Work;281
6.2.7;References;282
6.3;Informa: An Extensible Framework for Group Response Systems;284
6.3.1;Introduction;284
6.3.2;Goals;286
6.3.3;Informa;287
6.3.3.1;Architecture;287
6.3.3.2;Pedagogical Script;287
6.3.3.3;Protocol;288
6.3.4;Example Usage Scenario;290
6.3.4.1;Preparation;290
6.3.4.2;Classroom;291
6.3.5;Anonymity and Grouping;293
6.3.6;ProblemTypes;294
6.3.6.1;Multiple-Choice Questions;294
6.3.6.2;Text Highlighting Problems;295
6.3.6.3;Writing New Problem Type Plug-Ins;296
6.3.7;Evaluation;297
6.3.8;Related Work;298
6.3.9;Conclusions;298
6.3.10;References;299
6.4;Secure and Conditional Resource Coordination for Successful Collaborations;300
6.4.1;Introduction;300
6.4.1.1;Overview of the Collaborative Resource Model;301
6.4.1.2;Overview of the Resource CoordinationMechanism;301
6.4.2;A Scenario for Resource Centric Collaboration;302
6.4.3;The Collaborative Resource Model;303
6.4.3.1;Certificates and Certificate Patterns;303
6.4.3.2;Resource Dependency Graph;305
6.4.3.3;Access Polices;306
6.4.3.4;Access Conditions;308
6.4.3.5;Resource Satisfaction;308
6.4.4;Coordination Based on State-Space Exploration;309
6.4.4.1;States;310
6.4.4.2;State Transitions;310
6.4.4.3;Correctness;311
6.4.5;A Coordination Algorithm;312
6.4.6;Related Work;314
6.4.7;Conclusion;315
6.4.8;References;315
6.5;RiBAC: Role Interaction Based Access Control Model for Community Computing;317
6.5.1;Introduction and Motivation;317
6.5.2;Community Computing;318
6.5.2.1;Related Cooperation Based Approaches;318
6.5.2.2;Community Computing Model;319
6.5.3;Role Interaction-Based Access Control Model;321
6.5.3.1;Core RiBAC Model;322
6.5.3.2;Hierarchical RiBAC Model (H-RiBAC);325
6.5.3.3;Constrained RiBAC Model (C-RiBAC);327
6.5.3.4;Constrained Hierarchical RiBAC Model (CH-RiBAC);329
6.5.4;Extended Simple Community Computing Model;330
6.5.5;Related Works;332
6.5.6;Conclusion and Future Work;332
6.5.7;References;333
6.6;A Constraint and Attribute Based Security Framework for Dynamic Role Assignment in Collaborative Environments;335
6.6.1;Introduction;335
6.6.2;Security Model;338
6.6.2.1;Scenario;338
6.6.2.2;Framework Components;339
6.6.2.3;Attribute Constraints;340
6.6.2.4;Role-Constraints Partial Order;341
6.6.2.5;Transformation Functions;342
6.6.3;Reasoning;343
6.6.4;Prototype;345
6.6.4.1;Domain Ontology;345
6.6.4.2;RBAC Ontology;346
6.6.4.3;Transformation Functions;348
6.6.4.4;Graphical User Interface;348
6.6.4.5;Client Server Architecture;349
6.6.5;Related Work;349
6.6.6;Conclusions;350
6.6.7;References;351
6.7;Access Control Model for Sharing Composite Electronic Health Records;353
6.7.1;Introduction;353
6.7.1.1;A Motivation Scenario;354
6.7.2;Related Work;355
6.7.3;Logical Composite EHR Model;357
6.7.4;Authorization Model;361
6.7.4.1;Authorization Subject;361
6.7.4.2;Authorization Objects and Property Match;362
6.7.4.3;Information Sharing Privileges;363
6.7.4.4;Access Control Policy Specification;364
6.7.5;Concluding Remarks;364
6.7.6;References;366
6.7.7;Appendix;367
6.8;Employing Sink Mobility to Extend the Lifetime of Wireless Sensor Networks;368
6.8.1;Introduction;368
6.8.2;Related Work;370
6.8.3;Sink Mobility Strategy;372
6.8.3.1;Design Issues;372
6.8.3.2;Density-Based Touring Strategy;373
6.8.4;Experimental Validation;375
6.8.4.1;Simulation Environment;375
6.8.4.2;Experiments Setup and Performance Metrics;376
6.8.4.3;Experimental Results;376
6.8.5;Conclusion;380
6.8.6;References;380
6.9;Avoiding Greediness in Cooperative Peer-to-Peer Networks;383
6.9.1;Introduction;383
6.9.2;The T4TNT Game;385
6.9.2.1;Problem Definition;385
6.9.2.2;Reducing the T4TNT Game to the Leecher Problem;386
6.9.3;Study;386
6.9.4;Conclusions and Future Work;390
6.9.5;References;390
6.10;The Data Interoperability Problem as an Exemplary Case Study in the Development of Software Collaboration Environments;392
6.10.1;Introduction;392
6.10.2;Our Collaboration Metaphor;393
6.10.3;Facets Associated with the Development of Software Collaboration Environments;394
6.10.3.1;Cross–Cutting Concerns;394
6.10.3.2;Variability Axes;396
6.10.3.3;Functional Requirements;396
6.10.4;Review of Some Technologies;397
6.10.4.1;Technologies That Do Not Target End–Users Per Se;397
6.10.4.2;Actual Implementation Technologies;398
6.10.4.3;Technology Comparison;399
6.10.4.4;Characterizing ‘Killer Apps’;400
6.10.5;Other Related Work;400
6.10.6;Conclusions and Current Status;401
6.10.7;References;401
6.11;Towards a Framework for Evolvable Network Design;403
6.11.1;Introduction;403
6.11.2;Computer Network Design;404
6.11.3;The Network Cell;405
6.11.4;Network Cell Evolution;407
6.11.5;The CellNet Framework;409
6.11.6;Formal CellNet Based Network Definition;410
6.11.7;Network Realization Using CellNet;411
6.11.8;Related Work;413
6.11.9;Conclusion;413
6.11.10;References;414
6.12;A Comprehensive Comparison of Trust Management Systems for Federation;415
6.12.1;Introduction;415
6.12.2;Requirements of Federated Trust Management;416
6.12.3;Examination of Extant Systems;417
6.12.4;Characteristics of Federated Trust Management;419
6.12.4.1;Quality of Functionality;419
6.12.4.2;Cost of Functionality;419
6.12.4.3;Usability;420
6.12.5;Comprehensive Comparisons of Extant Systems;420
6.12.5.1;Trust Exchange;420
6.12.5.2;Trust Representation;422
6.12.5.3;Trust Establishment;424
6.12.5.4;Trust Enforcement;425
6.12.6;Conclusion;427
6.12.7;References;427
6.13;A Model of Bilinear-Pairings Based Designated-Verifier Proxy Signatue Scheme;429
6.13.1;Introduction;429
6.13.2;Related Knowledge;431
6.13.2.1;Bilinear Pairings;431
6.13.2.2;Some Mathematical Problems;431
6.13.2.3;Basic ID-Based Designated-Verifier Proxy Signature Scheme;432
6.13.3;Review of Cha and Cheon’s ID-Based Signature Scheme;432
6.13.4;A Model of Bilinear-Pairings Based Designated-Verifier Proxy Signature Scheme;433
6.13.4.1;Proxy Share Generation Phase;433
6.13.4.2;Proxy Signature Generation Phase;434
6.13.4.3;Proxy Signature Verification Phase;435
6.13.5;Correctness of above Scheme;435
6.13.6;Conclusions;436
6.13.7;References;436
6.14;A Unified Theory of Trust and Collaboration;438
6.14.1;Introduction;438
6.14.2;A Theory of Collaborative Activities;440
6.14.3;A Theory of Trust and Trust Communication;442
6.14.3.1;Definition of Trust;442
6.14.3.2;Trust Communication;444
6.14.4;Meshing of Collaboration and Trust;445
6.14.4.1;Trust as Prerequisite for Advancing the State of a Collaborative Activity;445
6.14.4.2;Collaborative Activity as Trust-Requiring Situation;446
6.14.5;A Running Example;447
6.14.5.1;Intentional Structure of the Domain Activity;447
6.14.5.2;Intentional Structure of Trust Communications;448
6.14.6;Discussion and Conclusion;448
6.14.7;References;449
6.15;Enabling Interoperable and Selective Data Sharing among Social Networking Sites;452
6.15.1;Introduction;452
6.15.2;Background and Related Technologies;453
6.15.2.1;Online Social Networks and Privacy Issues;453
6.15.2.2;OpenSocial and Profile Sharing;454
6.15.2.3;Credential Systems;455
6.15.3;Our Approach;455
6.15.3.1;Selective Disclosure Credentials;455
6.15.3.2;Extensions to the OpenSocial API;457
6.15.3.3;Attribute Mapping from OpenSocial to ADT-Based Credential;459
6.15.4;Current Implementation;460
6.15.5;Future Work;462
6.15.6;Conclusion;462
6.15.7;References;463
6.16;Evaluating the Trustworthiness of Contributors in a Collaborative Environment;464
6.16.1;Introduction;464
6.16.2;Model;465
6.16.2.1;Roles;465
6.16.2.2;Document Development;466
6.16.3;Trust Calculation: Algorithm and Implementation;466
6.16.3.1;Principles for the Trust Score Definition;467
6.16.3.2;Trust Score Components;467
6.16.3.3;Definition of Trust Scores;468
6.16.4;Algorithm and Implementation;469
6.16.4.1;The Command {\tt Svn Diff};469
6.16.4.2;Management of Deletion Propositions;470
6.16.4.3;Computing Trust Scores;471
6.16.4.4;Why a Reverse Order Processing?;472
6.16.5;Conclusions and Perspectives;472
6.16.6;References;473
6.17;Supporting Agile Development of Authorization Rules for SME Applications;474
6.17.1;Introduction;474
6.17.2;Agile Security Engineering;476
6.17.3;End-User Development of Authorization Policies;477
6.17.4;The Declarative Authorization Plugin;478
6.17.4.1;Authorization Rules DSL;478
6.17.4.2;Usage in Application Code;481
6.17.5;Early Feedback;482
6.17.6;Conclusion and Future Work;482
6.17.7;References;483
6.18;The Application of Human and Social Behavioral-Inspired Security Models for Self-aware Collaborative Cognitive Radio Networks;485
6.18.1;Introduction;485
6.18.2;The Cognitive Network Decision-Making Process;486
6.18.2.1;Cognitive Radio Network Security – A New Complex Dimension of Network Security;488
6.18.3;A Human and Social Behavior Approach;490
6.18.3.1;Potential Benefits of a Human-Social Behavioral Approach and Open Research Questions;492
6.18.4;Conclusions;496
6.18.5;References;496
6.19;GroupBanter: Supporting Serendipitous Group Conversations with IM;498
6.19.1;Introduction;498
6.19.2;Related Work;500
6.19.3;Group Conversations in IM;501
6.19.4;GroupBanter Prototype;502
6.19.5;Field Studies;502
6.19.5.1;Participants;503
6.19.5.2;Procedure;503
6.19.5.3;Data Collection and Analyses;503
6.19.6;Results;504
6.19.6.1;New Opportunities and Exchanges;507
6.19.6.2;Attitudes towards GroupBanter;507
6.19.6.3;Ephemeral versus Persistent Conversations;508
6.19.7;Design Suggestions and Challenges;508
6.19.8;Concluding Remarks;509
6.19.9;References;510
6.20;The Effect of Personality on Collaborative Task Performance and Interaction;512
6.20.1;Introduction;512
6.20.2;Group Personality Studies;513
6.20.3;Systems Used;514
6.20.3.1;DiamondTouch and DiamondSpin;514
6.20.3.2;F\'{ }schl\'{a}r-DT;515
6.20.4;Experimental Methodology;518
6.20.4.1;Participant Recruitment;518
6.20.4.2;Data Gathered;519
6.20.5;Results;519
6.20.5.1;Personality and Performance;519
6.20.5.2;Personality and Interaction;521
6.20.6;Conclusions;523
6.20.7;References;524
6.21;Replication in Overlay Networks: A Multi-objective Optimization Approach;525
6.21.1;Introduction;525
6.21.2;Background and Related Work;527
6.21.3;Architectural Overview;527
6.21.4;Problem Formulation;528
6.21.4.1;Latency;529
6.21.4.2;System Reliability;530
6.21.4.3;Storage;531
6.21.4.4;Conflicting Objectives;531
6.21.5;Our Approach: Multi-objective Optimization;532
6.21.5.1;Solution (Chromosome) Representation;532
6.21.5.2;Multi-objective Evolutionary (MOE) Optimization;532
6.21.5.3;Multi-objective Randomized Greedy (MORG) Optimization;534
6.21.6;Experiments and Results;535
6.21.6.1;Experimental Setup;535
6.21.6.2;Latency-Reliability Tradeoff;536
6.21.6.3;Storage-Reliability Tradeoff;537
6.21.6.4;Execution Time;539
6.21.7;Discussion;539
6.21.8;Conclusion;539
6.21.9;References;540
6.22;An Undo Framework for P2P Collaborative Editing;542
6.22.1;Introduction;542
6.22.2;Motivation;543
6.22.3;UNO Idea;544
6.22.4;The Operational Transformation (OT) Approach;545
6.22.5;Proposition: Undo as a New Operation;546
6.22.6;Instantiation;547
6.22.6.1;The Tombstones Transformation Functions;547
6.22.6.2;Undo Operation;547
6.22.7;Correctness;549
6.22.8;Integrating the UNO with Existing Integration Algorithms;551
6.22.9;Related Work;552
6.22.10;Conclusions;554
6.22.11;References;554
6.22.12;Appendix;556
6.23;A Contract Language for Service-Oriented Dynamic Collaborations;558
6.23.1;Introduction;558
6.23.2;Background and Motivation;560
6.23.3;WS-CCDL Framework;561
6.23.4;WS-CCDL Runtime Framework;566
6.23.5;Connectivity Service;568
6.23.6;Conclusions and Future Work;573
6.23.7;References;574
6.24;Monitoring Contract Enforcement within Virtual Organizations;576
6.24.1;Introduction;576
6.24.2;Contract Specification and Local Policy Representation in Virtual Organizations;578
6.24.3;Virtual Organization Lifecycle;580
6.24.4;Security Enhanced Virtual Organization Lifecycle;580
6.24.4.1;Virtual Organization Creation and Contract Distribution;580
6.24.4.2;Contract Enforcement and Monitoring;581
6.24.5;System Implementation;583
6.24.6;Related Work;587
6.24.7;Conclusions;588
6.24.8;References;589
6.24.9;A CheckRequestResource’s Code;589
6.25;Using Epidemic Hoarding to Minimize Load Delays in P2P Distributed Virtual Environments;591
6.25.1;Introduction;591
6.25.2;Motivation;592
6.25.3;Epidemic Hoarding;594
6.25.3.1;P2P Overlay Topology and Data Distribution;594
6.25.3.2;Epidemic Hot Spot Aggregation;595
6.25.3.3;Hoarding of Hot Spot Data;597
6.25.4;Evaluation Results;597
6.25.4.1;Preferential Way Point Mobility Model;598
6.25.4.2;Simulation Results;598
6.25.5;Related Work;602
6.25.6;Conclusion and Future Work;603
6.25.7;References;604
6.26;A Battery-Aware Algorithm for Supporting Collaborative Applications;607
6.26.1;Introduction;607
6.26.2;Data Collection;608
6.26.3;Churn and Battery Characteristics;609
6.26.3.1;Discussion;611
6.26.4;Battery-Aware Supernode Selection;612
6.26.4.1;Experimental Setup;612
6.26.4.2;Supernode Selection Algorithms;613
6.26.4.3;Results;613
6.26.4.4;Additional Observations;616
6.26.4.5;Discussion;617
6.26.5;Related Work;618
6.26.6;Conclusion;619
6.26.7;References;620
6.27;Collaborative Graphic Rendering for Improving Visual Experience;622
6.27.1;Introduction;622
6.27.2;Collaborative Graphic Rendering Design;624
6.27.2.1;Architecture;624
6.27.2.2;Potential Performance Bottlenecks;624
6.27.2.3;Improve Game Performance;626
6.27.3;Frame Rate Analysis: Mathematical Models;627
6.27.3.1;Basic Collaborative Rendering Platform;628
6.27.3.2;Collaboration with Local GPU Partially on;629
6.27.4;Performance Evaluation;629
6.27.4.1;Numerical Results;629
6.27.4.2;Measurement: Tocrs over Collaborative Rendering Platform;630
6.27.5;Conclusion;634
6.27.6;References;634
6.28;Analytics and Management of Collaborative Intranets;636
6.28.1;Introduction;636
6.28.2;Analytics Deployment;637
6.28.3;Analytic Framework;638
6.28.4;Case Study;639
6.28.5;Analytic Findings and Managerial Implications;640
6.28.6;Conclusions;643
6.28.7;References;644
6.29;Mashup Model and Verification Using Mashup Processing Network;645
6.29.1;Introduction;645
6.29.2;Related Work and Motivation;646
6.29.3;Patients Checkout Handling Mashup Example;648
6.29.4;Modeling Mashups;649
6.29.4.1;Introduction;649
6.29.4.2;MPN: Mashup Processing Network;649
6.29.5;Data Composition Operations;651
6.29.5.1;Routing;651
6.29.5.2;Aggregator;652
6.29.6;Data Transformation Operations;653
6.29.7;Data Validation;653
6.29.8;Mashup Validation;656
6.29.9;Implementation;657
6.29.10;Conclusion;660
6.29.11;References;661
6.30;Automatic Categorization of Tags in Collaborative Environments;662
6.30.1;Introduction;662
6.30.2;Problem Description;665
6.30.3;A Tag-Categoration Approach;666
6.30.4;A Prototype for Fringe;671
6.30.4.1;Experimental Results;671
6.30.5;Related Work;674
6.30.6;Conclusion and Future Work;674
6.30.7;References;675
6.31;A New Method for Creating Efficient Security Policies in Virtual Private Network;676
6.31.1;Introduction;676
6.31.2;Related Works;678
6.31.3;Creating Security Policies to Meet Security Requirements;678
6.31.3.1;Selection Decision;680
6.31.3.2;Policies Decision;680
6.31.4;Proposed Method;683
6.31.4.1;Analyses and Simulation;687
6.31.5;Conclusion and Future Work;689
6.31.6;References;690
6.32;Data Quality and Failures Characterization of Sensing Data in Environmental Applications;692
6.32.1;Introduction;692
6.32.2;Background;693
6.32.3;Quality-Oriented Sensing Data Analysis;694
6.32.3.1;Time Series Analysis for Individual Parameter;695
6.32.3.2;Multi-Modality and Spatial Sensing Data Analysis;701
6.32.4;Failure Analysis;703
6.32.4.1;Methodology;703
6.32.4.2;Failure Analysis by Type;704
6.32.4.3;Failure Analysis by Location;705
6.32.4.4;Summary and Implications;706
6.32.5;Related Work;706
6.32.6;Conclusion;707
6.32.7;References;707
6.33;Security through Collaboration in MANETs;709
6.33.1;Introduction;709
6.33.2;Related Work;710
6.33.2.1;Outlier Detection;710
6.33.2.2;Misbehavior Detection in Mobile Ad Hoc Networks;711
6.33.3;Gossip-Based Outlier Detection Algorithm;712
6.33.3.1;Algorithm Description;712
6.33.3.2;Trust Establishment and Management;714
6.33.3.3;An Example Scenario;714
6.33.4;Evaluation;716
6.33.4.1;Experimentation Setup;716
6.33.4.2;Experimentation Results;717
6.33.5;Conclusion;725
6.33.6;References;725
6.34;A Hybrid Key Predistribution Scheme for Sensor Networks Employing Spatial Retreats to Cope with Jamming Attacks;728
6.34.1;Introduction;728
6.34.2;Background;730
6.34.2.1;Key Predistribution for Sensor Networks;730
6.34.2.2;Jamming Attacks;732
6.34.3;Impact of Jamming on Secure Communications in Sensor Networks;733
6.34.4;Hybrid Key Predistribution Scheme;736
6.34.5;Performance Evaluation;737
6.34.6;Discussions, Limitations, and Ongoing Work;742
6.34.7;Conclusion;743
6.34.8;References;743
6.35;Location-Based Mapping Services to Support Collaboration in Spatially Distributed Workgroups;745
6.35.1;Introduction;745
6.35.2;Related Work;747
6.35.3;Concept of the Collaborative Map;749
6.35.4;The POPEYE Platform for Collaborative Applications;751
6.35.5;CoMa Realization;751
6.35.5.1;Map-Based Visualization;751
6.35.5.2;Interaction with CoMa;752
6.35.5.3;Implementation of Collaboration;754
6.35.5.4;Integration of CoMa with POPEYE;754
6.35.6;Future Work;756
6.35.7;Conclusion;756
6.35.8;References;757
6.36;Serial vs. Concurrent Scheduling of Transmission and Processing Tasks in Collaborative Systems;759
6.36.1;Introduction;759
6.36.2;Processing and Transmission Tasks;760
6.36.3;Scheduling of Tasks;762
6.36.3.1;Running Example;762
6.36.3.2;Process-first and Transmit-First Scheduling Policies;763
6.36.3.3;Concurrent Scheduling Policy;765
6.36.3.4;Simultaneous Commands;767
6.36.4;Simulations;767
6.36.4.1;Parameter Values;768
6.36.4.2;Simulations;769
6.36.4.3;Process-First vs. Transmit-First;769
6.36.4.4;Concurrent vs. Sequential;770
6.36.5;Conclusions and Future Work;771
6.36.6;References;772
6.37;Ontology Support for Managing Top-Down Changes in Composite Services;773
6.37.1;Introduction;773
6.37.2;Preliminary;775
6.37.2.1;A Supporting Infrastructure of an SOE;776
6.37.2.2;The Change Layers;776
6.37.3;Ontology-Based Framework for Change Management;777
6.37.3.1;Top-Down Change Model;777
6.37.3.2;Change Manager;778
6.37.3.3;The Ontology Manager;779
6.37.4;Web Service Ontology;780
6.37.4.1;Ontology Definition;780
6.37.4.2;Ontology Structure;781
6.37.5;Service Ontology Query Infrastructure;782
6.37.5.1;Processing the Service Ontology Queries;782
6.37.5.2;Automatic SOE Schema Modification;785
6.37.6;Experiments;786
6.37.6.1;Constructing the Service Ontology;786
6.37.6.2;Performance Study;787
6.37.7;Related Work;788
6.37.8;Conclusion;789
6.37.9;References;789
6.38;Trusted Translation Services;791
6.38.1;Introduction;791
6.38.2;Background and Related Work;793
6.38.3;Translation Workflows and Web Services;794
6.38.4;Trust Specification;799
6.38.5;Prototype and Case Study;800
6.38.5.1;Murshid Web Service;800
6.38.5.2;XLIFF Specification for Murshid Web Service;801
6.38.6;Conclusion;802
6.38.7;References;803
6.39;Enabling Meetings for “Anywhere and Anytime”;805
6.39.1;Introduction;805
6.39.2;Meeting Opportunities Enabled by Mobility;806
6.39.3;Related Work;807
6.39.4;EasyMeet V1.0: Design and Implementation;808
6.39.4.1;Features and Capabilities;808
6.39.4.2;Implementation of EasyMeet;810
6.39.5;EasyMeet V2.0: Design and Implementation;812
6.39.5.1;S60 Web Runtime Widget;812
6.39.5.2;Simultaneous Voice and Data Sharing;813
6.39.5.3;Remote Content Access from Mobile Phone;813
6.39.5.4;Leveraging Mobile Phone Platform Capabilities as Web Services;814
6.39.6;Initial Feedback;815
6.39.7;Conclusion;816
6.39.8;References;816
6.40;Collaboratively Sharing Scientific Data;818
6.40.1;Introduction;818
6.40.2;Overview of Scientific Data Management with SciPort;820
6.40.2.1;Scientific Data Modeling;820
6.40.2.2;XML Based Implementation;820
6.40.3;Sharing Distributed Scientific Data;821
6.40.3.1;Sharing Data through a Central Server;822
6.40.3.2;Data Synchronization;823
6.40.3.3;Security and Trust between Local Servers and the Central Server;823
6.40.3.4;Sharing Data in Multiple Data Networks;825
6.40.4;Sharing Schemas;825
6.40.4.1;Publishing Schemas;826
6.40.4.2;Three Scenarios of Schemas Sharing;828
6.40.5;Uniform Schema Sharing and Management;829
6.40.5.1;Uniform Schema Management;829
6.40.5.2;An Example of Uniform Schema Management;831
6.40.6;Distributed Multiform Schema Sharing;832
6.40.7;Schema Change Detection;833
6.40.8;Related Work;833
6.40.9;Conclusion;835
6.40.10;References;835
6.41;IT Incident Management as a Collaborative Process: A Visualization Tool Inspired to Social Networks;837
6.41.1;Introduction;837
6.41.2;The IT Incident Management Process;838
6.41.3;ITSupportster;840
6.41.4;Validation of the Prototype;842
6.41.5;Related Work;842
6.41.6;Conclusion and Future Work;843
6.41.7;References;843
7;Author Index;844




